Skip to main content

Posts

Showing posts with the label seo

Fiverr Virtual assitant Test 2021

  ware over the Internet rather than locally on a computer or other device. Answer: • Cloud computing Question:* Work invoices should ______________________. Answer: • be sent out in a timely Question:* Which of the following is NOT a social media platform where users can post their own tips and reviews? Answer: • Yelp Question:* ____________________ has had many plugins created for popular website platforms like WordPress and Joomla, apps for smart phones and tablets, and tools for use with software programs like Excel. Answer: • StatCounter Question:* What is “social media optimization”? Answer: • Creating short content which is easily indexed Question:* A(n)________________ policy covers monetary damage that a client may suffer if they receive faulty services and protects the service provider in the event that they are sued. Answer: • professional liability   Question:* Virtual Assistants must protect all confidential information that they obtain while working with clients due to __

Secure Network Architecture (Course-era Google IT Professional Certificate) Quiz

  Secure Network Architecture TOTAL POINTS 7 Video link: https://www.youtube.com/watch?v=raoM2SrPsrU 1 . Question  1 VIDEO LINK: HTTPS://WWW.YOUTUBE.COM/WATCH?V=RAOM2SRPSRU Why is normalizing log data important in a centralized logging setup? 1 / 1 point Log normalizing detects potential attacks. Uniformly formatted logs are easier to store and analyze. It's difficult to analyze abnormal logs. The data must be decrypted before sending it to the log server. Correct Nice work! Logs from various systems may be formatted differently. Normalizing logs is the practice of reformatting the logs into a common format, allowing for easier storage and lookups in a centralized logging system. 2 . Question  2 What type of attacks does a flood guard protect against? Check all that apply. 1 / 1 point DDoS attacks Correct You got it! A flood guard protects against attacks that overwhelm networking resources, like DoS attacks and SYN floods. Man-in-the-middle attacks Malware infections SYN floods C